December 2022
Intermediate to advanced
198 pages
6h 27m
English
Human error is not an explanation, rather it is something to be explained. In analyzing and learning from incidents, not just security incidents, you should never be satisfied with anyone closing out a post-mortem or issue as having a root cause of human error.
—Phil Venables, Google Cloud CISO
If you use a computer that is connected to the Internet, your information is at risk. Our sensitive data can also be stolen through third-party vendors. Even more startling is that the time between an attack and disclosure from a third party is about 75 days! Imagine what can be done with stolen information in that amount of time. In addition, the most common type of third-party attack ...